Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2634 | Duplicate Advisory: Code injection in Directus |
| Link | Providers |
|---|---|
| https://directus.io/ |
|
| https://fluidattacks.com/advisories/bocelli |
|
Mon, 19 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 19 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Monospace
Monospace directus |
|
| CPEs | cpe:2.3:a:monospace:directus:10.13.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Monospace
Monospace directus |
Fri, 16 Aug 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Directus
Directus directus |
|
| CPEs | cpe:2.3:a:directus:directus:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Directus
Directus directus |
|
| Metrics |
ssvc
|
Thu, 15 Aug 2024 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Directus v10.13.0 allows an authenticated external attacker to execute arbitrary JavaScript on the client. This is possible because the application injects an attacker-controlled parameter that will be stored in the server and used by the client into an unsanitized DOM element. When chained with CVE-2024-6534, it could result in account takeover. | |
| Title | Directus 10.13.0 - DOM-Based cross-site scripting (XSS) via layout_options | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-05-19T17:56:31.826Z
Reserved: 2024-07-05T14:42:08.072Z
Link: CVE-2024-6533
Updated: 2024-08-16T17:31:46.952Z
Status : Modified
Published: 2024-08-15T03:15:04.567
Modified: 2025-05-19T18:15:26.833
Link: CVE-2024-6533
No data.
OpenCVE Enrichment
No data.
EUVD